MX2017003533A - Establecimiento de fiabilidad entre dos dispositivos. - Google Patents

Establecimiento de fiabilidad entre dos dispositivos.

Info

Publication number
MX2017003533A
MX2017003533A MX2017003533A MX2017003533A MX2017003533A MX 2017003533 A MX2017003533 A MX 2017003533A MX 2017003533 A MX2017003533 A MX 2017003533A MX 2017003533 A MX2017003533 A MX 2017003533A MX 2017003533 A MX2017003533 A MX 2017003533A
Authority
MX
Mexico
Prior art keywords
trust information
trusted entity
another
trust
connect
Prior art date
Application number
MX2017003533A
Other languages
English (en)
Spanish (es)
Inventor
Dawoud Shenouda Dawoud Peter
Saboori Anoosh
SONI Himanshu
Michael Ingalls Dustin
L Porter Nelly
Original Assignee
Microsoft Technology Licensing Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Technology Licensing Llc filed Critical Microsoft Technology Licensing Llc
Publication of MX2017003533A publication Critical patent/MX2017003533A/es

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Power Engineering (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
MX2017003533A 2014-09-17 2015-09-16 Establecimiento de fiabilidad entre dos dispositivos. MX2017003533A (es)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201462051833P 2014-09-17 2014-09-17
US14/640,538 US9716716B2 (en) 2014-09-17 2015-03-06 Establishing trust between two devices
PCT/US2015/050309 WO2016044356A1 (en) 2014-09-17 2015-09-16 Establishing trust between two devices

Publications (1)

Publication Number Publication Date
MX2017003533A true MX2017003533A (es) 2017-06-21

Family

ID=55455971

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2017003533A MX2017003533A (es) 2014-09-17 2015-09-16 Establecimiento de fiabilidad entre dos dispositivos.

Country Status (11)

Country Link
US (4) US9716716B2 (zh)
EP (2) EP3860086B1 (zh)
JP (1) JP2017533630A (zh)
KR (2) KR102369647B1 (zh)
CN (2) CN111726356B (zh)
AU (1) AU2015317918A1 (zh)
BR (1) BR112017003695A2 (zh)
CA (1) CA2959809A1 (zh)
MX (1) MX2017003533A (zh)
RU (1) RU2017108756A (zh)
WO (1) WO2016044356A1 (zh)

Families Citing this family (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10630686B2 (en) 2015-03-12 2020-04-21 Fornetix Llc Systems and methods for organizing devices in a policy hierarchy
US10560440B2 (en) * 2015-03-12 2020-02-11 Fornetix Llc Server-client PKI for applied key management system and process
US10965459B2 (en) 2015-03-13 2021-03-30 Fornetix Llc Server-client key escrow for applied key management system and process
US11444766B2 (en) * 2015-07-06 2022-09-13 Apple Inc. Combined authorization process
US10341384B2 (en) * 2015-07-12 2019-07-02 Avago Technologies International Sales Pte. Limited Network function virtualization security and trust system
US9883382B2 (en) * 2015-10-02 2018-01-30 Cisco Technology, Inc. Dynamically hashed MAC address for transmission in a network
KR101678795B1 (ko) * 2015-11-30 2016-11-22 전삼구 블록체인 인증을 이용하는 IoT 기반 사물 관리 시스템 및 방법
US10225247B2 (en) * 2015-12-14 2019-03-05 Intel Corporation Bidirectional cryptographic IO for data streams
US10880281B2 (en) 2016-02-26 2020-12-29 Fornetix Llc Structure of policies for evaluating key attributes of encryption keys
US10917239B2 (en) 2016-02-26 2021-02-09 Fornetix Llc Policy-enabled encryption keys having ephemeral policies
US11063980B2 (en) 2016-02-26 2021-07-13 Fornetix Llc System and method for associating encryption key management policy with device activity
US10931653B2 (en) 2016-02-26 2021-02-23 Fornetix Llc System and method for hierarchy manipulation in an encryption key management system
US10860086B2 (en) 2016-02-26 2020-12-08 Fornetix Llc Policy-enabled encryption keys having complex logical operations
CN107040922B (zh) * 2016-05-05 2019-11-26 腾讯科技(深圳)有限公司 无线网络连接方法、装置及系统
US11251957B2 (en) * 2016-06-28 2022-02-15 Robert Bosch Gmbh System and method for delegating ticket authentication to a star network in the internet of things and services
US10127160B2 (en) * 2016-09-20 2018-11-13 Alexander Gounares Methods and systems for binary scrambling
CN106792700A (zh) * 2016-12-23 2017-05-31 北京握奇数据系统有限公司 一种可穿戴设备的安全通信环境的建立方法及系统
KR101900861B1 (ko) * 2017-01-26 2018-09-20 주식회사 엔에스에이치씨 웨어러블 디바이스를 이용한 타원 곡선 전자 서명 알고리즘의 분산 키 관리 시스템 및 방법
KR102453145B1 (ko) 2017-03-16 2022-10-14 삼성전자주식회사 전자장치 및 그를 이용한 트랜잭션 수행 방법
CN107172027A (zh) * 2017-05-05 2017-09-15 北京凤凰理理它信息技术有限公司 证书管理方法、存储设备、存储介质和装置
US11138546B2 (en) * 2017-06-14 2021-10-05 International Business Machines Corporation Tracking objects using a trusted ledger
US10819696B2 (en) * 2017-07-13 2020-10-27 Microsoft Technology Licensing, Llc Key attestation statement generation providing device anonymity
US11128610B2 (en) * 2017-09-29 2021-09-21 Apple Inc. Secure multiway calling
US11080246B2 (en) * 2017-12-11 2021-08-03 Celo Foundation Decentralized database associating public keys and communications addresses
CN108282333B (zh) * 2018-03-02 2020-09-01 重庆邮电大学 工业云环境下多边缘节点协作模式下数据安全共享方法
CN108667893B (zh) * 2018-03-07 2021-01-05 创新先进技术有限公司 数据推荐方法、装置和电子设备
JP6408180B1 (ja) * 2018-03-20 2018-10-17 ヤフー株式会社 端末制御プログラム、端末装置および端末制御方法
CN111066306B (zh) * 2018-03-27 2022-09-16 华为技术有限公司 在局域网内共享数据的方法及电子设备
US11611541B2 (en) * 2018-08-07 2023-03-21 Citrix Systems, Inc. Secure method to replicate on-premise secrets in a cloud environment
US10608692B1 (en) * 2018-11-20 2020-03-31 Amazon Technologies, Inc. Dual receivers for advertisement scans
CN109861980B (zh) * 2018-12-29 2020-08-04 阿里巴巴集团控股有限公司 一种建立可信计算集群的方法、装置、存储介质及计算设备
US11696133B2 (en) * 2019-02-21 2023-07-04 Blackberry Limited Method and system for provisioning device specific WLAN credentials
US11356851B2 (en) 2019-12-03 2022-06-07 Harris Global Communications, Inc. Communications system having multiple carriers with selectively transmitted real information and fake information and associated methods
FR3105682B1 (fr) * 2019-12-20 2022-05-13 E Scopics Procede et systeme de gestion d’echange de donnees dans le cadre d’un examen medical
GB2612499A (en) * 2020-07-08 2023-05-03 Cervais Inc Peer-to-peer secure communication, apparatus, and method
US11095730B1 (en) * 2020-09-14 2021-08-17 Dell Products Llp Automated device discovery system
US11502988B2 (en) * 2021-01-21 2022-11-15 Cisco Technology, Inc. Stable MAC address change process
CN113329204B (zh) * 2021-08-03 2021-10-01 北京电信易通信息技术股份有限公司 一种基于终端信任管理的数据安全传输方法及系统

Family Cites Families (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5978475A (en) 1997-07-18 1999-11-02 Counterpane Internet Security, Inc. Event auditing system
US6304974B1 (en) * 1998-11-06 2001-10-16 Oracle Corporation Method and apparatus for managing trusted certificates
US6772331B1 (en) 1999-05-21 2004-08-03 International Business Machines Corporation Method and apparatus for exclusively pairing wireless devices
JP2000349747A (ja) 1999-06-02 2000-12-15 Hitachi Ltd 公開鍵管理方法
WO2001011843A1 (en) 1999-08-06 2001-02-15 Sudia Frank W Blocked tree authorization and status systems
GB2359955B (en) 2000-03-01 2003-07-23 3Com Corp Network unit including address hashing
US6829651B1 (en) 2000-04-11 2004-12-07 International Business Machines Corporation Local MAC address learning in layer 2 frame forwarding
US7096354B2 (en) 2000-08-04 2006-08-22 First Data Corporation Central key authority database in an ABDS system
US7181017B1 (en) * 2001-03-23 2007-02-20 David Felsher System and method for secure three-party communications
EP1343286A1 (en) 2002-03-04 2003-09-10 BRITISH TELECOMMUNICATIONS public limited company Lightweight authentication of information
US20070055867A1 (en) 2003-03-14 2007-03-08 Rajesh Kanungo System and method for secure provisioning of encryption keys
GB2422995B (en) * 2003-11-04 2007-07-18 Ntt Comm Corp Method, apparatus and program for establishing encrypted communication channel between apparatuses
US8843413B2 (en) 2004-02-13 2014-09-23 Microsoft Corporation Binding content to a domain
US7636941B2 (en) 2004-03-10 2009-12-22 Microsoft Corporation Cross-domain authentication
US7350074B2 (en) * 2005-04-20 2008-03-25 Microsoft Corporation Peer-to-peer authentication and authorization
US7840682B2 (en) * 2005-06-03 2010-11-23 QNX Software Systems, GmbH & Co. KG Distributed kernel operating system
CN101467156B (zh) 2006-05-02 2012-05-09 皇家飞利浦电子股份有限公司 用于创建对象的方法、系统和设备
US9002018B2 (en) * 2006-05-09 2015-04-07 Sync Up Technologies Corporation Encryption key exchange system and method
CA2571891C (en) 2006-12-21 2015-11-24 Bce Inc. Device authentication and secure channel management for peer-to-peer initiated communications
JP2010538563A (ja) * 2007-09-07 2010-12-09 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ セキュアネットワークを確立するためのネットワーク及び方法
US8239549B2 (en) * 2007-09-12 2012-08-07 Microsoft Corporation Dynamic host configuration protocol
US7779136B2 (en) * 2007-11-01 2010-08-17 Telefonaktiebolaget L M Ericsson (Publ) Secure neighbor discovery between hosts connected through a proxy
US8429403B2 (en) 2008-08-12 2013-04-23 Juniper Networks, Inc. Systems and methods for provisioning network devices
EP2454899A1 (en) * 2009-07-15 2012-05-23 Koninklijke Philips Electronics N.V. Method for securely broadcasting sensitive data in a wireless network
US8752161B1 (en) * 2009-07-22 2014-06-10 Cisco Technology, Inc. Securing and authenticating multiple devices behind a NAT device
US8417966B1 (en) * 2010-05-28 2013-04-09 Adobe Systems Incorporated System and method for measuring and reporting consumption of rights-protected media content
US20120144197A1 (en) * 2010-12-02 2012-06-07 Jong-Moon Chung Point-to-point communication method in a wireless sensor network and methods of driving coordinators and communication devices in the wireless sensor network
US8990891B1 (en) * 2011-04-19 2015-03-24 Pulse Secure, Llc Provisioning layer two network access for mobile devices
US8850191B2 (en) * 2011-04-28 2014-09-30 Netapp, Inc. Scalable groups of authenticated entities
EP2700256B1 (en) * 2011-05-20 2017-11-29 BlackBerry Limited Verifying passwords on a mobile device
US9202042B2 (en) 2011-06-14 2015-12-01 Lantiq Beteiligungs-GmbH & Co.KG Automatic device pairing
US9015469B2 (en) * 2011-07-28 2015-04-21 Cloudflare, Inc. Supporting secure sessions in a cloud-based proxy service
DE102011080876A1 (de) * 2011-08-12 2013-02-14 Tridonic Gmbh & Co Kg Management des Gerätebesitzes und Inbetriebnahme in drahtlosen Netzwerken mit Verschlüsselung durch öffentliche Schlüssel
JP5731673B2 (ja) * 2011-12-09 2015-06-10 アラクサラネットワークス株式会社 証明書配付装置およびその方法、並びにコンピュータプログラム
US9026789B2 (en) 2011-12-23 2015-05-05 Blackberry Limited Trusted certificate authority to create certificates based on capabilities of processes
US9130837B2 (en) * 2012-05-22 2015-09-08 Cisco Technology, Inc. System and method for enabling unconfigured devices to join an autonomic network in a secure manner
US8874916B2 (en) * 2012-09-28 2014-10-28 Intel Corporation Introduction of discrete roots of trust
US8832783B2 (en) 2012-09-28 2014-09-09 Intel Corporation System and method for performing secure communications
US8954735B2 (en) * 2012-09-28 2015-02-10 Intel Corporation Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware
US8594632B1 (en) 2012-12-11 2013-11-26 Intel Corporation Device to-device (D2D) discovery without authenticating through cloud
US8850543B2 (en) 2012-12-23 2014-09-30 Mcafee, Inc. Hardware-based device authentication
US9325697B2 (en) * 2013-01-31 2016-04-26 Hewlett Packard Enterprise Development Lp Provisioning and managing certificates for accessing secure services in network
US20140281497A1 (en) 2013-03-13 2014-09-18 General Instrument Corporation Online personalization update system for externally acquired keys
US9237021B2 (en) 2013-03-15 2016-01-12 Hewlett Packard Enterprise Development Lp Certificate grant list at network device
US9367676B2 (en) * 2013-03-22 2016-06-14 Nok Nok Labs, Inc. System and method for confirming location using supplemental sensor and/or location data
US11127001B2 (en) * 2013-05-09 2021-09-21 Wayne Fueling Systems Llc Systems and methods for secure communication
CN103391541B (zh) * 2013-05-10 2016-12-28 华为终端有限公司 无线设备的配置方法及装置、系统
CN103886263A (zh) * 2014-03-19 2014-06-25 宇龙计算机通信科技(深圳)有限公司 一种对移动终端中的数据进行保护的方法及系统
CN104168269B (zh) * 2014-07-24 2016-05-04 深圳市腾讯计算机系统有限公司 安全连接建立方法、装置及系统

Also Published As

Publication number Publication date
EP3860086A1 (en) 2021-08-04
JP2017533630A (ja) 2017-11-09
EP3860086B1 (en) 2024-05-29
CN107079006B (zh) 2020-07-03
CN111726356B (zh) 2022-08-05
WO2016044356A1 (en) 2016-03-24
US20160080380A1 (en) 2016-03-17
US9716716B2 (en) 2017-07-25
US11032279B2 (en) 2021-06-08
KR102504051B1 (ko) 2023-02-24
BR112017003695A2 (pt) 2017-11-28
CN107079006A (zh) 2017-08-18
US10581848B2 (en) 2020-03-03
US20170289157A1 (en) 2017-10-05
KR20220029782A (ko) 2022-03-08
RU2017108756A (ru) 2018-09-17
AU2015317918A1 (en) 2017-03-16
KR102369647B1 (ko) 2022-03-02
US20170302666A1 (en) 2017-10-19
CN111726356A (zh) 2020-09-29
KR20170060004A (ko) 2017-05-31
EP3195557A1 (en) 2017-07-26
EP3195557B1 (en) 2021-04-21
US20190386992A1 (en) 2019-12-19
CA2959809A1 (en) 2016-03-24
US10362031B2 (en) 2019-07-23

Similar Documents

Publication Publication Date Title
MX2017003533A (es) Establecimiento de fiabilidad entre dos dispositivos.
SG10201901366WA (en) Key exchange through partially trusted third party
PH12020550006A1 (en) Key attestation statement generation providing device anonymity
WO2015123366A3 (en) Methods and apparatus to provide extended object notation data
MX2021014176A (es) Metodo y sistema para una variante de cadena de bloques utilizando firmas digitales.
EP4254860A3 (en) Key pair infrastructure for secure messaging
MX2022003019A (es) Metodo y sistema para la provision y almacenamiento de claves criptograficas distribuidas mediante criptografia de curva eliptica.
CA2914281C (en) Electronic authentication systems
WO2015179020A3 (en) Generalized entity network translation (gent)
EA201891822A1 (ru) Безопасность персональных устройств с использованием криптографии на основе эллиптических кривых для разделения секрета
WO2015134533A3 (en) Authentication of virtual machine images using digital certificates
WO2016126332A3 (en) Data security operations with expectations
MY190913A (en) Device and method for secure connection
WO2016057086A3 (en) Common modulus rsa key pairs for signature generation and encryption/decryption
WO2014191768A3 (en) Multi-factor zero-knowledge authentication using pairings
BR112017003018A2 (pt) fornecimento seguro de uma credencial de autenticação
WO2016130198A3 (en) Secure computer evaluation of k-nearest neighbor models
BR112019001011A2 (pt) estabelecimento de canal seguro
WO2014182727A3 (en) Selectively performing man in the middle decryption
BR112016028287A2 (pt) geração de assinatura digital semideterminística
WO2017106705A3 (en) Secure vehicle communication system
WO2016077017A3 (en) Trusted platform module certification and attestation utilizing an anonymous key system
WO2015056010A3 (en) Registry apparatus, agent device, application providing apparatus and corresponding methods
MX2016001900A (es) Criptografia nado utilizando funciones unidireccionales.
EP3568795A4 (en) TECHNIQUES FOR AUTHENTIC DEVICE ASSURANCE BY ESTABLISHMENT OF IDENTITY AND TRUST USING CERTIFICATES